Pages

UK Cyber Security Strategy themes revealed

UK Cyber Security Strategy themes revealed
ZDNet UK
Businesses must look to forming close working relationships with competitors to share sensitivecybersecurity information, they will be told when the document is published. The UK Cyber Security Strategy is due on 25 November, a Cabinet Office ...

Interagency group proposes federal cybersecurity career path
GCN.com
By William Jackson Responding to the lack of a consistent definition for cybersecurity jobs and their skill sets, an interagency workforce education group has proposed a framework to help provide a path for professional development in government for ...

Lockheed Martin Plans Australian Cyber Security Center
eSecurity Planet
Lockheed Martin, which already has cyber security centers in the US and UK, has announced plans to build one in Canberra, Australia. "Its NextGen Cyber Innovation and Technology Centre (NCITE) is now under construction, and will comprise 900 square ...

Cync Program looks to build cyberbusiness
UPI.com
11 (UPI) -- Small cybersecurity businesses have struggled to nab the US government as a client but a big brother in the contracting business has teamed with a Maryland university to try to change that. The Cync Program was created by defense contractor ...

Commercial Sector Weighs In on Cybersecurity
Signal Magazine
It might be a surprise to most who deal with cybersecurity in the government sector, but cybersecurity experts in the commercial sector believe there are many “pockets of excellence” in the .gov and .mil domain. Chris Coleman, Director of Cybersecurity ...

Education briefs
Baltimore Sun
The college has several classrooms specifically equipped with the latest cyber security technology to train students. The first scholarship will be awarded next fall. Scholarships can cover tuition and fees, books, a computer and educational supplies. ...

Staff Reporter - Washington Business Journal
Washington Business Journal
A little-known but powerful cybersecurity company has accused industry giant Booz Allen Hamilton Inc. of stealing its proprietary security software, then cutting it out of a joint bid for a federal contract. In a lawsuit filed in Fairfax County Circuit ...

5 Tips for Job Seekers
GovInfoSecurity.com (blog)
As we look back on the national month of cybersecurity awareness, it's important for all of us to remember that security education - whether among IT professionals, consumers, or our young people - is an ongoing effort that doesn't end with October. ...

Interior Minister holds meetings at US Department of State
Focus News
Interior Minister Tsvetan Tsvetanov discussed cyber security with Director of the US Sec ... Washington. During the third day of their working visit to the US Bulgarian Interior Minister Tsvetan Tsvetanov and the Director of the Directorate General for ...

Companies not investing enough in IT security
Sydney Morning Herald
Chief information officers are aware of the increasingly dangerous cyber securityenvironment but ignore this and instead have placed their trust in cloud computing providers, according to a study. They also wait for security problems to be exposed by...

Irvine Sensors rebrands, reveals new logo
OC Metro
ISC8 also announced that it plans to release a new product line early in 2012, with a focus on providing the most comprehensive cyber-security solutions available. The firm's continued advances in the development of anti-tamper, advanced sensor and 3D ...

Defense expert shares experiences, hopes
Emporia Gazette
He is now the Issue Lead for cyber-security for IBM. “I refer to myself as Forrest Gump Bucci,” said Bucci. “Because I liked the character in the movie and (have been) in a lot of pictures standing over the shoulders of some really important people ...

Rogue apps sting smartphone users in premium rate SMS scam
Info4Security
Minister for Cyber Security Francis Maude said: “More and more people are using their smart phone to transmit personal and financial information over the Internet, whether it's for online banking, shopping or social networking. ...

Cyber-Terror: Still Nothing to See Here
Watching the Watchers.org
The "oh, God" part of Kaspersky's comment is a standard rhetorical trope in the apocalyptic discussions of cybersecurity. (I knock these down in Conundrum, coming out shortly in Minnesota Law Review.) And paralyzing a city isn't too hard: snowstorms do ...

Davidson County Events: TSU grants to fund study into security
The Tennessean
Money from the National Science Foundation grant will be used for research and to rewrite computer science and electrical and computer engineering curricula to include information on cybersecurity. Dr. Sachin Shetty, assistant professor in the ...

The 2012 Federal IT Market: Opportunities and Challenges
govWin (blog)
Cybersecurity -- Regardless of attempts to save elsewhere, Plexico noted, evolving threats and the need to secure information used by an increasingly mobile workforce mean that cybersecurityspending will rise in 2012. Plexico suggested that changes in ...

LGS Innovations' Kelly on federal communications industry
FederalNewsRadio.com
The companies' new products "range from radio frequency (RF), photonics, and Internet cybersecurity solutions, to best-of-breed products, services and systems," according to the company website. According to his bio, Kelly has "developed and deployed ...

Firms Eager to Hire Veterans
FINS
"People come out of the armed services with an enormous variety of skills, from leadership training to cybersecurity to finance," Jeff Cathey, head of military banking at Bank of America, told Fortune. "They have an amazing work ethic, so they tend to ...

International effort takes down cybercrime gang
Irish Times
The arrests were the result of a complex effort, dubbed Operation Ghost Click, which involved the FBI working with Estonian law enforcement, the Dutch high-tech crime unit, various industry groups andcyber security experts. ...

FBI and Trend Micro orchestrate biggest cybercrime takedown ever
Geek.com
As far back as 2008, it was common knowledge in the cybersecurity business that Esthost — the creation of an Estonian company called Rove Digital — served a clientele that was largely criminal in nature. What the FBI, Trend, and other security ...

Seven Charged In $14M Internet Fraud Scheme
TPM
The subsequent investigation and bust was codenamed “Operation Ghost Click,” according to Sophos cybersecurity blog Naked Security. Six of the suspects were arrested in their home country of Estonia by the Estonian Police and Border Guard Board, ...

Preparing a power failure response strategy
Continuity Central (press release)
In addition, Dr. Kennedy has authored numerous information/cyber security and business continuity articles for US and international publications, has presented at numerous national conferences and seminars, and has taught courses in these disciplines ...

CyberTelecom Blog: What is a Cybersecurity Professional, NIST ...
By Cybertelecom
The National Initiative on Cybersecurity Education (NICE) has published for public comment a draft document that classifies the typical duties and skill requirements of cybersecurity workers. The document is meant to define professional ...
CyberTelecom Blog

"To Log or Not to Log?" Cyber Security Agency ENISA Reports on ...
By Blackmere
"To Log or Not to Log?" Cyber Security Agency ENISA Reports on Future Impact of Life-Logging and Online … – Yahoo Finance. Published November 10, 2011. ENISA is looking ahead to 2014 to predict positive and negative effects of online, ...
Blackmere Consulting

The silent cyber war | Business Computing World
By Kate Craig-Wood
There has recently been a lot of news about cyber security, and it is a hot item in Whitehall and at the top levels in the IT industry. Further, London City University recently announced it is opening a Centre for Cyber and Security Sciences, with ...
Business Computing World